CVE-2022-49182

Source
https://cve.org/CVERecord?id=CVE-2022-49182
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49182.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49182
Downstream
Related
Published
2025-02-26T01:55:33.574Z
Modified
2026-03-12T03:24:46.538452Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
net: hns3: add vlan list lock to protect vlan list
Details

In the Linux kernel, the following vulnerability has been resolved:

net: hns3: add vlan list lock to protect vlan list

When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49182.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c6075b193462d9a3930fb41f587f94720658752a
Fixed
30f0ff7176efe8ac6c55f85bce26ed58bb608758
Fixed
09e383ca97e798f9954189b741af54b5c51e7a97
Fixed
f58af41deeab0f45c9c80adf5f2de489ebbac3dd
Fixed
1932a624ab88ff407d1a1d567fe581faa15dc725

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49182.json"